Audit Program - Logical Security
Audit Program - Logical Security
BY:
APPROVED
BY:
Assigned
Sec.
A
A
AUDIT PROGRAM
Logical Security
Audit Date:____________
Sub-Sec.
Audit Step
Date
Ref.
Initials
SYSTEMS UNDERSTANDING
1.0
Organization
Objective: To ensure that the audit team has a clear understanding of the delineation of
responsibilities for system administration and maintenance.
1.1
2.0
Hardware Platforms
Objective: To ensure that the audit team has a clear understanding of the hardware
platforms subject to review and to obtain the necessary information for identifying
critical systems throughout the processing environment.
2.1
2.2
2.3
3.0
Operating System
Objective: To ensure that the audit team has a clear understanding of the operating
system included in the scope of the review. Furthermore, to ensure that known
vulnerabilities associated with specific operating system versions are considered during
the audit to ensure that all exposures are identified.
3.1
3.2
3.3
3.4
3.5
Ascertain which version(s) of the operating system are running on the servers
included in the scope of the audit.
Determine if the most current version of the operating system is installed. If not,
evaluate the justification for why the most current version is not installed.
Ascertain whether all known operating system fixes have been installed. If not,
evaluate the justification for why available fixes have not been installed.
Determine if procedures are in place to ensure that system administration
personnel are informed of available operating system fixes in a timely manner.
Determine if third-party security software is running on the servers.
4.0
Network Overview
Objective: To ensure that the audit team has a clear understanding of network
components and interfaces which may impact the logical security of specific servers and
workstations.
Page 1
PREPARED
BY:
APPROVED
BY:
Assigned
Sec.
Sub-Sec.
4.1
B
B
1.0
AUDIT PROGRAM
Logical Security
Audit Date:____________
Date
Ref.
Initials
SECURITY MANAGMENT
Roles & Responsibilities
Objective: To ensure that roles and responsibilities for security management have been
clearly and appropriately defined.
1.1
1.2
2.0
2.1
2.2
2.3
3.0
3.1
3.2
3.3
3.4
C
C
1.0
SECURITY ADMINISTRATION
Roles & Responsibilities
Objective: To ensure that roles and responsibilities for security administration have been
clearly and appropriately defined.
1.1
Page 2
PREPARED
BY:
APPROVED
BY:
Assigned
AUDIT PROGRAM
Logical Security
Audit Date:____________
Sec.
Sub-Sec.
1.2
2.0
Staffing
Audit Step
Date
Ref.
Initials
Objective: To ensure that appropriate processes are in place to ensure that individuals
with security administration responsibilities are qualified to complete defined security
administration tasks.
2.1
2.2
2.3
2.4
Evaluate the hiring process for system and security administration personnel.
Specifically, determine if:
written job descriptions exist for system and security administrators,
a process is in place to ensure that prospective employee are appropriately
qualified, and
prospective employee skills are adequately assessed prior to employment.
Determine if security administration personnel have been adequately trained to
support the technology that they are responsible for.
Ascertain if backup system and security administration personnel have been
identified to provide systems support in the event that the primary administrator(s)
are unavailable.
Determine if vendors / contractors have security administration responsibilities.
3.0
3.1
C
C
3.2
3.3
C
C
3.4
3.5
D
D
SYSTEM CONFIGURATION
1.0
Servers
Objective: To ensure that adequate controls are in place over the installation and
configuration of server hardware.
1.1
1.2
1.3
Determine if formal policies and standards exist for the installation and
configuration of server hardware.
Determine if documented procedures / checklists exist to support the server
installation process.
Determine if processes are in place to ensure that server installations are in
compliance with applicable policies and standards.
Page 3
PREPARED
BY:
APPROVED
BY:
Assigned
Sec.
AUDIT PROGRAM
Logical Security
Audit Date:____________
Sub-Sec.
Audit Step
Date
Ref.
Initials
2.1
2.2
2.3
3.0
Determine if formal policies and standards exist for the configuration of the
operating system under review.
If policies and standards exist, identify which of these policies and standards are
applicable to the environment under review.
Determine if procedures are in place to ensure compliance with applicable policies
and standards throughout the configuration process for operating system
installations and upgrades.
3.1
3.2
3.3
3.4
3.5
3.6
3.7
3.8
4.0
4.1
4.2
Review relevant corporate policies and standards for the operating system under
review. Tailor this audit program to ensure that audit procedures are designed to
ensure that operating system configuration settings are in compliance with those
policies and standards.
Evaluate existing best practices for the configuration of operating system security
parameters. Tailor this audit program to ensure that applicable best practices are
considered in the audit approach.
Page 4
PREPARED
BY:
APPROVED
BY:
Assigned
Sec.
Sub-Sec.
4.3
4.3.1
4.3.2
4.3.3
D
D
4.3.4
4.3.5
4.3.6
D
D
4.3.7
4.3.8
5.0
AUDIT PROGRAM
Logical Security
Audit Date:____________
Date
Ref.
Initials
Evaluate current operating system configuration settings to ensure that the settings
are in compliance with relevant corporate policies and standards and conform to
best practices.
Ensure that all default passwords for predefined system accounts have been
changed.
Determine if the configurations for predefined system account profiles have
been changed from the vendor settings. If so, determine why and evaluate the
effect of the changes on system security.
Determine if the configurations for predefined group profiles have been
changed from the vendor settings. If so, determine why and evaluate the effect
of the changes on system security.
Ensure that all guest accounts have been disabled or removed from the system.
Ensure that the assigned passwords for super-user accounts are known by
appropriate system / security administration personnel only.
Ensure that all defined system services have been approved and are in
compliance with relevant configuration policies and standards.
Ensure that all systems services are configured to appropriate system ports.
Ensure that processes are in place to prevent the operating system from being
booted with unauthorized configuration settings.
System Utilities
Objective: To ensure that adequate controls are in place over the use of sensitive system
utilities.
5.1
5.2
5.3
5.4
NOTE: Sections D 6.0 through D 8.0 are only applicable if third-party security
systems are installed and relied upon my management to control system level
access (e.g., TopSecret).
D 6.0 Security System Configuration - Policies & Standards
Objective: To ensure that third-party security system installations and upgrades are
configured in compliance with appropriate security and configuration policies and
standards.
6.1
6.2
6.3
7.0
Determine if formal policies and standards exist for the configuration of the thirdparty security system under review.
If policies and standards exist, identify which of these policies and standards are
applicable to the environment under review.
Determine if procedures are in place to ensure compliance with applicable policies
and standards throughout the configuration process for security system
installations and upgrades.
Page 5
PREPARED
BY:
APPROVED
BY:
Assigned
Sec.
Sub-Sec.
7.1
7.2
7.3
7.4
7.5
7.6
7.7
7.8
8.0
AUDIT PROGRAM
Logical Security
Audit Date:____________
Date
Ref.
Initials
8.1
8.2
8.3
D
D
D
8.3.1
8.3.2
8.3.3
8.3.4
8.3.5
8.3.6
D
D
8.3.7
8.3.8
Review relevant corporate policies and standards for the security system under
review. Tailor this audit program to ensure that audit procedures are designed to
ensure that third-party security system configuration settings are in compliance
with those policies and standards.
Evaluate existing best practices for the logical system security. Tailor this audit
program to ensure that applicable best practices are considered in the audit
approach.
Evaluate current third-party security system configuration settings to ensure that
the settings are in compliance with relevant corporate policies and standards and
conform to best practices.
Ensure that all default passwords for predefined accounts have been changed.
Ensure that ownership of all predefined accounts is documented.
Determine if the configurations for predefined system account profiles have
been changed from the vendor settings. If so, determine why and evaluate the
effect of the changes on system security.
Determine if the configurations for predefined group profiles have been
changed from the vendor settings. If so, determine why and evaluate the effect
of the changes on system security.
Ensure that the assigned passwords for super-user accounts are known by
appropriate system / security administration personnel only.
Ensure that all defined system services have been approved and are in
compliance with relevant configuration policies and standards.
Ensure that all systems services are appropriately configured.
Ensure that processes are in place to prevent the system from being booted /
IPLed with unauthorized security system configuration settings.
Page 6
PREPARED
BY:
APPROVED
BY:
Assigned
Sec.
E
E
AUDIT PROGRAM
Logical Security
Audit Date:____________
Sub-Sec.
1.0
Audit Step
Date
Ref.
Initials
ACCESS CONTROLS
Account Management
Objective: To ensure that appropriate controls are in place over the system level account
management process.
1.1
1.2
1.3
1.3.1
1.3.2
1.4
Page 7
PREPARED
BY:
APPROVED
BY:
Assigned
AUDIT PROGRAM
Logical Security
Audit Date:____________
Sec.
Sub-Sec.
1.5
Judgmentally select a sample of accounts from the account listing requested in step
E 1.3 and review the following:
Are all account IDs unique and in compliance with existing naming
conventions?
Is appropriate documentation available to support the authorization of each
account and the approval of all access rights and privileges granted to each
account?
Is documentation available which supports periodic reviews of user access
rights?
2.0
Password Management
Audit Step
Date
Ref.
Initials
Objective: To ensure that the system has been configured to facilitate the use of secure
passwords to prevent unauthorized access to critical applications, data and system
resources.
2.1
2.2
3.0
Page 8
PREPARED
BY:
APPROVED
BY:
Assigned
AUDIT PROGRAM
Logical Security
Audit Date:____________
Sec.
Sub-Sec.
3.1
3.2
3.2.1
Select a sample of accounts from the system account listing requested in step E
1.3.
Review the current configurations of user profiles for each of the accounts
included in the sample:
Ensure that the user profiles are configured securely and comply with
applicable corporate policies and standards.
Ensure that the access rights and privileges assigned to each user are
commensurate with the users job responsibilities.
If login scripts are used, ensure that the login scripts are appropriately
secured.
Ensure that the home directory for each account is properly referenced
and secured.
Ensure that the account has not been inactive for an unreasonable time
period (e.g., greater than 90 days).
4.0
Audit Step
Date
Ref.
Initials
4.1
4.2
4.2.1
Page 9
PREPARED
BY:
APPROVED
BY:
Assigned
Sec.
AUDIT PROGRAM
Logical Security
Audit Date:____________
Sub-Sec.
4.2.2
5.0
Audit Step
Date
Ref.
Initials
Review the current configurations of each group profile included in the sample:
Obtain an understanding of the purpose of each group profile.
Ensure that the group profiles are configured securely and comply with
applicable corporate policies and standards.
Review the access rights and privileges provided by the group profiles
and ensure that the access rights and privileges are reasonable based upon
the purpose of the profile (i.e., is there an issue regarding segregation of
functions, etc.).
Ensure that the user accounts assigned to each group profile are
appropriate? Are the access rights and privileges provided to the user by
the group profile commensurate with each users job responsibilities?
Privileged Accounts
Objective: To ensure that adequate controls are in place over the authorization,
ownership, and use of sensitive super-user accounts.
5.1
5.2
5.2.1
5.3
Page 10
PREPARED
BY:
APPROVED
BY:
Assigned
Sec.
AUDIT PROGRAM
Logical Security
Audit Date:____________
Sub-Sec.
5.3.1
6.0
Audit Step
Date
Ref.
Initials
6.1
6.2
7.0
7.1
7.2
7.3
7.4
7.5
7.6
7.7
8.0
Determine if the systems have been configured to lock accounts after a specified
number of invalid logon attempts (e.g., 3 invalid attempts allowed prior to the
system taking evasive action)?
Determine if system banners are displayed on the systems during the login process
to provide a warning against unauthorized access.
Ensure that Organization specific information is not included in the system banner
displays.
Determine if user names and / or passwords are hardcoded in logon scripts or
command procedures.
Determine if the systems have been configured to automatically logoff or lock a
terminal / workstation after a specified period of inactivity (e.g., greater than 15
minutes of inactivity)?
Determine if the systems have been configured to limit concurrent logins to a
single account.
Determine if system consoles have been appropriately secured to prevent
unauthorized access?
Page 11
PREPARED
BY:
APPROVED
BY:
Assigned
Sec.
Sub-Sec.
8.1
8.2
8.3
8.4
9.0
AUDIT PROGRAM
Logical Security
Audit Date:____________
Date
Ref.
Initials
Remote Access
Objective: To ensure that appropriate controls are in place to control access to the
internal network and systems from a remote system.
9.1
10.0
10.1
10.2
1.0
F
F
Objective: To ensure that system level security has been configured to appropriately
protect critical system directories and files.
1.1
1.2
1.3
1.3.1
Page 12
PREPARED
BY:
APPROVED
BY:
Assigned
Sec.
AUDIT PROGRAM
Logical Security
Audit Date:____________
Sub-Sec.
1.3.2
1.3.3
F
F
1.4
1.5
2.0
Audit Step
Date
Ref.
Initials
2.1
2.2
2.3
2.3.1
2.3.2
2.3.3
3.0
3.1
3.2
3.3
3.3.1
3.3.2
3.3.3
Page 13
PREPARED
BY:
APPROVED
BY:
Assigned
Sec.
G
G
AUDIT PROGRAM
Logical Security
Audit Date:____________
Sub-Sec.
Audit Step
Date
Ref.
Initials
Logging
Objective: To ensure that appropriate security events are logged to provide security
administration personnel with the ability to appropriately monitor system security.
1.1
1.2
G
G
G
1.3
1.4
1.5
2.0
Reporting
Objective: To ensure that appropriate reports are produced to summarize data recorded
in audit logs so that security events may be efficiently monitored on a timely basis.
2.0
2.1
3.0
Monitoring
Objective: To ensure that appropriate processes and procedures are in place to monitor
security reports in order to detect security violations and unauthorized changes to system
security configurations in a timely manner.
3.1
Page 14
PREPARED
BY:
APPROVED
BY:
Assigned
Sec.
Sub-Sec.
3.2
AUDIT PROGRAM
Logical Security
Audit Date:____________
Date
Ref.
Initials
Page 15
PREPARED
BY:
APPROVED
BY:
Assigned
Sec.
AUDIT PROGRAM
Logical Security
Audit Date:____________
Sub-Sec.
Audit Step
Date
Ref.
Initials
Initials
____________________________
________
____________________________
________
____________________________
________
____________________________
________
____________________________
________
____________________________
________
Page 16